研究生: |
邱仙姿 Chiu, Hsien-Tzu |
---|---|
論文名稱: |
分散式噴泉碼在無線感測網路上之時序資料擷取研究 A Framework of Temporal Data Retrieval for Unreliable WSNs Using Distributed Fountain Codes |
指導教授: |
王家祥
Jia-Shung Wang |
口試委員: |
曾煜棋
Tseng, Yu-Chee 許健平 Sheu, Jang-Ping 陳伯寧 Chen, Po-Ning |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2013 |
畢業學年度: | 102 |
語文別: | 英文 |
論文頁數: | 54 |
中文關鍵詞: | 無線網路 、分散式儲存編碼 、噴泉碼 、LT 碼 、時間相依性 |
外文關鍵詞: | WSNs, Distributed storage coding, Fountain codes, LT codes, Temporal dependency |
相關次數: | 點閱:4 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
分散式儲存編碼(distributed storage coding)被廣泛運用在無線感測網路(WSNs)上。目的在於即便有些感測器(Sensors)因為電池耗盡或外力損害等因素而失效,可以透過編碼的方式還原其感測器的資料。這類相關研究中,如何有效率且具規模地將資料散佈於無線感測網路上是一個挑戰。我們假設N storage sensors 當中有K sensors可以感測資料並以隨機漫步(Random walk)的方式將資料散佈於網路上,每一個感測器隨機選擇一些接收到的資料將其編碼成一筆資料並儲存。本篇論文交叉使用兩種噴泉碼(Fountain Codes):Luby Transform (LT) codes和Repairable Fountain (RF) codes來處理感測器量測之序列資料(Time series)。在無線感測網路上執行噴泉碼需要長距離(Lengthy hop-count)擴散達到高度隨機性,以提升解碼率(Source decoded rate)。為了有效降低傳輸成本,本論文提出利用時序資料相依度高的特性,不須每筆資料都需要成功解碼,反而利用補償機制來補足解碼失敗資料。我們提出一種架構(Framework)達到上述效果:首先將時序資料分為兩類,t時序倍數採用高解碼率處理(完全還原);其餘(t-1)時序資料採用較低解碼率處理(部分還原),最後利用內插估算未被還原的資料。本架構使用LT codes和RF codes提升資料取得的可靠度,以理論估計最適解碼率來大幅降低傳輸量,同時將時序資料還原誤差值(NRMSE)控制在4%以下。
Distributed storage coding has been widely applied on data gathering over unreliable wireless sensor networks (WSNs), where it is essential to ensure the data persistence in case of massive sensor failures caused by battery run-out or some physical damage problems surroundings. How to efficiently and scalably disseminate and collect the sensing data over WSNs is a key challenge yet. In this study, assumed that there are K sensor nodes equipped sensing apparatus within N storage sensors, these K numbers of sensors can sense environmental changes and disseminate coded (by Fountain codes) time-series data over WSNs using the simple random walk. That is, each sensor will receive others’ data, randomly select d (which according to the chosen degree distribution) of them, and encode into an encoded data then store it. In this thesis, we employ two types of Fountain codes: Luby Transform (LT) codes and Repairable Fountain (RF) codes to maintain the level of data persistence. In order to perform the Fountain codes over WSNs, the question is to disseminate data in the long range of random walks to preserve the randomness so as to boost the source decoded rate. In other words, the hop count would be long enough such that the decoding process can be perfectly completed using less amount of redundancy (say 10%).
In this thesis, a framework of less communication cost is proposed due to the temporal dependency of time-series data. The concept is simple: the complete decoding is not necessary for most of time-series data since the missing portions can be compensated by neighbors if exists. Our framework works as follows. We separate time-series data into two categories. For a given number t, the data corresponding to the numbers divisible by t will be totally recovered with high probability; however, the data corresponding to the other time slots is set as partially recovered. As mentioned, the missing one can be interpolated by the nearby neighboring data through temporal dependency. The proposed framework employs LT codes and RF codes to increase the level reliability. Besides, a mathematical model to estimate the appropriate source decoded rate is proposed to reduce the transmission cost (hop count) while maintaining tolerable level (< 4% normalized root-mean-square error (NRMSE)) of errors as well.
[1] J.W. Byers, M. Luby, M. Mitzenmacher, and A. Rege, “A Digital Fountain Approach to Reliable Distribution of Bulk Data,” Proceedings of ACM SIGCOMM ‘98, pp. 56-67, Vancouver, September 1998.
[2] J.W. Byers, M. Luby, and M. Mitzenmacher. “A Digital Fountain Approach to Asynchronous Reliable Multicast,” IEEE J. on Selected Areas in Communications, Special Issue on Network Support for Multicast Communications, Vol. 20, No. 8, pp. 1528-1540, October 2002.
[3] M. Luby, "LT Codes," The 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 271-280, November 2002.
[4] M. Asteris, and A.G. Dimakis, "Repairable Fountain codes," IEEE International Symposium on Information Theory (ISIT), pp.1752-1756, July 2012.
[5] A. Kamra, J. Feldman, V. Misra and D. Rubenstein, “Growth Codes: Maximizing Sensor Network Data Persistence,” Proc. ACM SIGCOMM 2006, Pisa, Italy, 2006.
[6] Y. Lin, B. Liang and B. Li, “Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes,” Proc. IEEE INFOCOM 2007, Anchorage, AL, 2007.
[7] S. Aly, Z. Kong, and E. Soljanin, “Fountain codes based distributed storage algorithms for large-scale wireless sensor networks,” Proc. IEEE/ACM IPSN, S. Louis, 2008.
[8] D. Vukobratovic, C. Stefanovi, V. Crnojevi, F. Chiti, and R. Fantacci,“Rateless Packet Approach for Data Gathering in Wireless Sensor Networks,” IEEE Journal on Selected Areas in Communications, Vol. 28, No. 7, pp. 1169-1179, Sept. 2010.
[9] S. A. Aly, H. Darwish, M. Youssef, and M. Zidan, “Distributed flooding-based storage algorithms for large-scale wireless sensor networks,” IEEE International Conference on Communications, June 2009.
[10] L. Lovasz, “Random walks on graphs: A survey,” Combinatorics, Paul Erdos is Eighty, Vol. 2, Keszthely, 1993. Also in Bolyai Soc. Math. Stud., Vol. 2, Janos Bolyai Math. Soc., pp. 1–46, Budapest, 1993.
[11] D. Aldous, J. Fill, “Reversible Markov chains and random walks on graphs,” unpublished, http://stat-www.berkeley.edu/users/aldous/RWG/book.html.
[12] S. Boyd, P. Diaconis, and L. Xiao, “Fastest Mixing Markov Chain on a Graph,” SIAM Review, problems and techniques section, vol. 46(4), pp. 667–689, December 2004.
[13] N. Metropolis, A. Rosenbluth, M. Rosenbluth, A. Teller, and E. Teller, “Equations of state calculations by fast computing machines,” J. Chem. Phys., Vol. 21, pp. 1087–1092, 1953.
[14] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, “Mixing Times for Random Walk on Geometric Random Graphs,” Proc. SIAM ANALCO Workshop, 2005.
[15] P. Gupta and P. R. Kumar, “The Capacity of Wireless Networks,” IEEE Trans. Info. Theory, Vol. 46, No. 2, pp. 388–404, March 2000.
[16] C. Avin and G. Ercal, “On the cover time and mixing time of random geometric graphs,” Theor. Comp. Science, Vol. 380, pp. 2–22, 2007.
[17] J. Liang, J. Wang, X. Zhang, and J. Chen, “An Adaptive Probability Broadcast-based Data Preservation Protocol in Wireless Sensor Networks,” IEEE International Conference on Communications, June 2011.
[18] J. C. S. Cardoso, C. Baquero, and P. S. Almeida, “Probabilistic estimation of network size and diameter,” in Latin-American Symposium on Dependable Computing, pp. 33-40, João Pessoa, Brasil, September 2009.
[19] M. Korkalainen, M. Sallinen, Niilo Karkkainen, and P. Tukeva, “Survey of Wireless Sensor Networks Simulation Tools for Demanding Applications," 5th International Conference on Networking and Services, 2009.
[20] H. L. Harsh Sundani, Vijay K. Devabhaktuni, Mansoor Alam, and Prabir Bhattacharya, "Wireless Sensor Network Simulators A Survey and Comparisons," International Journal of Computer Networks (IJCN), Vol. 2, 2010.
[21] Castalia, Available in http://castalia.research.nicta.com.au
[22] A. Boulis, Castalia User Manual.
[23] A. G. Dimakis, V. Prabhakaran, and K. Ramchandran. “Decentralized erasure codes for distributed networked storage,” IEEE/ACM Transactions on Networking, pp. 2809-2816, June 2006.
[24] A. G. Dimakis, V. Prabhakaran, and K. Ramchandran. “Distributed fountain codes for networked storage,” IEEE Conference on Acoustics, Speech and Signal Processing, May 2006.
[25] Saeed Ghahramani, Fundamentals of probability with stochastic process, 3rd Edition, Pearson/Prentice Hall, 2005.
[26] M. Penrose. Random geometric graphs, Vol. 5, Oxford: Oxford University Press, 2003.
[27] V. Bioglio, M. Grangetto, R. Gaeta, and M. Sereno. “An optimal partial decoding algorithm for rateless codes,” IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2731-2735, 2011.
[28] H. Elmeleegy, A. K. Elmagarmid, E. Cecchet, W. G. Aref, and W. Zwaenepoel, "Online piece-wise linear approximation of numerical streams with precision guarantees," in Proceedings of the VLDB Endowment, August 2009.